Tuesday, August 4, 2020
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST
Home News Page 3

News

Software-Defined Perimeters Offer Secure Connectivity to Smart Cities

Software-Defined Perimeters Offer Secure Connectivity to Smart Cities

0
By Don Boxley, CEO, and Co-Founder, DH2i (www.dh2i.com)Smart cities are on the rise—in a really big way. According to Microsoft, smart-city initiatives—which can be defined as cities that rely on Internet of Things (IoT) sensors to obtain data that...
In 2020, SOCs Are Understaffed Yet Overconfident in Ability to Detect Cyberthreats

In 2020, SOCs Are Understaffed Yet Overconfident in Ability to Detect Cyberthreats

0
Exabeam’s ‘2020 State of the SOC Report’ offers peer-to-peer SOC comparisons By Steve Moore, chief security strategist, and Samantha Humphries, senior product marketing manager, ExabeamSecurity operations centers (SOCs) are on the frontlines in protecting businesses and government agencies against cyberthreats...
Benefits of A Security Operation Center (SOC)

Benefits of A Security Operation Center (SOC)

0
By Pedro Tavares,  Editor-in-Chief seguranca-informatica.ptThe creation of a Security Operations Center (SOC) has increasingly stood out as something necessary to help companies defend themselves against damage caused by cyber-attacks. SOC is considered the kernel of an organization's security operations,...

DOJ indicts Fxmsp hacker for selling access to hacked businesses

0
The US Department of Justice has indicted a hacker named Fxmsp for hacking over three hundred organizations worldwide and selling access to their networks.The US Department of Justice has indicted a hacker that goes online with the moniker Fxmsp...
Is Proactive Insider Risk Mitigation Possible?

Is Proactive Insider Risk Mitigation Possible?

0
Why Companies Need More Than Technical Indicators to Identify Their Biggest Threats Before They Do HarmBy David A. Sanders, Director of Insider Threat Operations, HaystaxMost corporate insider threat programs are structured and equipped to mitigate adverse events perpetrated by...

The Blue Whale Challenge – Cyber-bullying Teens

0
What is it? The "Blue Whale Challenge", is an online interactive phenomenon where an administrator or "curator" assigns 50 tasks to a participating and compliant individual. A task is issued roughly each day, with photos, videos, or some recorded proof...
Don’t Be Breached When Using Commercial Software Products

Don’t Be Breached When Using Commercial Software Products

0
By Randy Reiter CEO of Don’t Be BreachedIn May 2020 the software giant SAP made available eighteen security fixes for its Adaptive Server Enterprise (ASE) database system (formerly Sybase ASE). ASE is used by SAP products and 30,000 organizations...

Project Freta, a free service that allows finding malware in OS memory snapshots

0
Microsoft launched Project Freta, a free service that allows users to find malware, including rootkit, in operating system memory snapshots. Microsoft has unveiled a new project, dubbed Project Freta, for the discovery of malicious code in operating system memory snapshots. The...
Organizations: It’s Time to Rethink How You Protect Environments from Within

Organizations: It’s Time to Rethink How You Protect Environments from Within

0
By Richard Melick, senior technical product manager, AutomoxMany of us have made the shift to virtual with our work, school, and social lives, as we all aim to protect ourselves and the community during this uncertain time. As such,...

North Korean Lazarus APT stole credit card data from US and EU stores

0
North Korea-linked hackers have been stealing payment card data from customers of large retailers in the U.S. and Europe for at least a year.Sansec researchers reported that North Korea-linked Lazarus APT group has been stealing payment card information from...

STAY CONNECTED

35,313FansLike
55,546FollowersFollow